
Cisco IOS networking security
Collection Cisco IOS reference library
Résumé
Through the use of real-world examples, it provides the reader with the most current technologies available and teaches how to effectively
implement and support these technologies on a network. After reading this book, administrators will possess a greater understanding of Cisco
network security solutions and the hardware, protocols, and services involved. Hence, they will be able to make more intelligent, cost-effective
and quantifiable networking decisions for their environment. Cisco Network Security will help readers perform their jobs at a higher level. It
offers system optimization techniques, which will strengthen results, increase productivity and improve efficiency.
Table of contents :
- Chapter 1: Security Overview ..... 1
- Part I: Authentication, Authorization, and
Accounting (AAA)
- Chapter 2: AAA Overview ..... 19
- Chapter 3: Configuring Authentication ..... 27
- Chapter 4: Authentication Commands ..... 63
- Chapter 5: Configuring Authorization ..... 95
- Chapter 6: Authorization Commands ..... 103
- Chapter 7: Configuring Accounting ..... 109
- Chapter 8: Accounting Commands ..... 123
- Part II: Security Server Protocols
- Chapter 9: Configuring RADIUS ..... 133
- Chapter 10: RADIUS Commands ..... 143
- Chapter 11: Configuring TACACS+ ..... 153
- Chapter 12: Configuring TACACS and Extended TACACS
..... 165
- Chapter 13: TACACS, Extended TACACS, and TACACS+
Commands ..... 177
- Chapter 14: Configuring Kerberos ..... 195
- Chapter 15: Kerberos Commands ..... 221
- Part III: Traffic Filtering
- Chapter 16: Access Control Lists: Overview and
Guidelines ..... 243
- Chapter 17: Configuring Lock-and-Key Security (Dynamic
Access Lists) ..... 251
- Chapter 18: Lock-and-Key Commands ..... 261
- Chapter 19: Configuring IP Session Filtering (Reflexive
Access Llists) ..... 269
- Chapter 20: Reflexive Access List Commands .....
281
- Chapter 21: Configuring TCP Intercept (Prevent
Denial-of-Service Attacks) ..... 287
- Chapter 22: TCP Intercept Commands ..... 293
- Part IV: Network Data Encryption
- Chapter 23: Configuring Network Data Encryption .....
309
- Chapter 24: Network Data Encryption Commands ..... 359
- Part V: Other Security Features
- Chapter 25: Configuring Passwords and Privileges .....
435
- Chapter 26: Passwords and Privileges Commands .....
449
- Chapter 27: Neighbor Router Authentication: Overview
and Guidelines ..... 467
- Chapter 28: Configuring IP Security Options .....
471
- Chapter 29: IP Security Options Commands ..... 479
- Appendixes
- Appendix A: Radius ..... 503
- Appendix B: TACACS+Attribute-Value Pairs ..... 515
- Index ..... 527
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Cisco Press |
Collection | Cisco IOS reference library |
Parution | 10/06/1998 |
Nb. de pages | 500 |
Format | 232 x 187 |
EAN13 | 9781578700578 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse